Four Trends Driving Demand For Data Security

Data Security Trends

2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among the responses, we identified four trends that are expected to drive demand for data security in the next year.

Many organizations are now cloud first or cloud only

Cloud adoption has exploded in the last two years, from 15% in 2014 to 39% in 2015. In 2016, deployments of cloud productivity apps like Microsoft office 365 and Google G Suite topped 59%. When organizations look to deploy a new application, it’s often a cloud app because they offer a cost advantage, more flexibility, and are much easier for IT teams to maintain and manage.

Of the few enterprises that aren’t yet cloud first, many already have a plan in place for migrating from premises-based apps. The leading concern for these holdouts is data security. How can they protect sensitive corporate data where they no longer control the application infrastructure or endpoint devices? There is increasing demand from security pros for solutions that meet a broad scope of security and compliance requirements, from cloud encryption to access controls.

Fragmented app security

Among the requirements many organizations have for the cloud are a set of security capabilities that provide the visibility and control they require for regulatory or internal compliance. Unfortunately, different apps have different capabilities. While an app like Office 365 may scan for malware and provide some visibility capabilities, other cloud apps like Slack have much more rudimentary security features.

To deal with fragmented native app security, many have turned to cloud access security brokers (CASBs) for a consistent set of policy and control capabilities – everything from DLP to cloud encryption – that work across all cloud apps. Demand for cross-app security will become increasingly important in 2017 as more premises applications are phased out in favor of equally capable, more flexible cloud apps.

Demand for mobile

As data moves into the cloud, much of it will eventually find its way onto mobile devices that are at high risk of loss or theft. Data leakage is a very real threat and a top concern for infosec professionals. Whether in healthcare, financial services, or life sciences, employees want more flexibility in the ways they access corporate data, the tools they use to collaborate, and the devices they carry. Many physicians, for example, use personal mobile devices to access sensitive patient information. Oftentimes IT has no choice but to allow access, a gap in security that can result in a costly breach.

Our survey revealed that one in four organizations see unmanaged device controls as a top priority for the coming year, more than any other security capability, simply because demand for BYOD is so pervasive.

Privacy concerns

On any smartphone or laptop, you’re bound to find a great deal of personal information – bank logins, personal email, location data, and more. But privacy is not only an issue with mobile, it’s also a challenge on laptops and desktops, where employees want to access corporate data and collaborate, but also occasionally need to conduct personal affairs. Organizations that try to block every personal application or track all of an employee’s behavior on a personal mobile device will face push back.

As much as mobile will continue to drive demand for data security, in 2017, privacy will drive demand for a new class of security solutions that respect end-user privacy. By focusing on securing corporate data in system of record SaaS apps like Office 365 and G Suite, IT leaders can strike a balance between privacy and security that is easily rolled out across the organization and meets compliance requirements.

Data protection is now top of mind for CIOs and CISOs because of the growing frequency of breaches, the high costs associated with data leakage, and cloud compliance mandates. There’s no question that security needs are evolving as enterprises adopt a cloud-first, mobile-first strategy, and that these needs will become an even greater focus in 2017. In the months ahead, keep an eye on CASB adoption, widely expected to be the leading class of solutions for comprehensive data security. And lastly, watch the mobile security space as organizations transition from mobile device management (MDM) to agentless, data-centric solutions that respect user privacy.

By Anurag Kahol

Holiday Photos.png
Growing Up.png
The Report.png
Hair Loss.png
MIT
Smart Manufacturing Startups AI and machine learning's potential to drive greater visibility, control, and insight across shop floors while monitoring machines and processes in real-time continue to attract venture capital. $62 billion is now invested ...
Rahul Subramanyam
Fixing AWS: The CloudFix Story A conversation with Rahul Subramanyam. CEO at CloudFix, and CTO at ESW Capital AWS is huge, but it’s not perfect. Because of its size and its approach to innovation there ...
Shireesh Thota
Here’s How to Position Your Organization for the Era of Data Intensity We live in a data-intensive era. Data is booming. Companies are realizing that data is one of the most important assets and they ...
Gilad David Maayan
What is Zero Trust Network Access (ZTNA)? In a zero-trust security model, all user connections are authenticated, and users only receive the access and privileges they need to fulfill their role. This is very different ...
Gilad David Maayan
Azure Storage Pricing Introduction to Azure Storage Services Azure Storage is a set of cloud storage services provided by Microsoft as part of the Azure public cloud. It offers highly scalable object storage, file systems ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.